Sciweavers

136 search results - page 4 / 28
» Securing interdependent assets
Sort
View
119
Voted
HICSS
2010
IEEE
153views Biometrics» more  HICSS 2010»
15 years 9 months ago
Securing E-Government Assets through Automating Deployment of Honeynets for IDS Support
One of the challenges facing system e-government security professionals is the laborious task of sifting through numerous log files in an attempt to identify malicious traffic and...
Christopher Hecker, Brian Hay
SAC
2010
ACM
15 years 9 months ago
Nudge: intermediaries' role in interdependent network security
ombiners for Software Hardening - Extended Abstract (Short Paper) Amir Herzberg and Haya Shulman (Bar Ilan University) The PUF Promise (Short Paper) Heike Busch and Miroslava Sotak...
Jens Grossklags, Svetlana Radosavac, Alvaro A. C&a...
89
Voted
ATAL
2009
Springer
15 years 9 months ago
Approximately fair and secure protocols for multiple interdependent issues negotiation
Katsuhide Fujita, Takayuki Ito, Mark Klein
NIPS
2003
15 years 3 months ago
Algorithms for Interdependent Security Games
Michael J. Kearns, Luis E. Ortiz
JIFS
2010
65views more  JIFS 2010»
15 years 24 days ago
Secure and efficient protocols for multiple interdependent issues negotiation
Katsuhide Fujita, Takayuki Ito, Mark Klein